Security In Peer To Peer Network

Read Complete Research Material



Security in Peer to Peer network

Abstract

The importance and significance of peer to peer networks is increasing since the period of past 5 years. The deployment of peer to peer network provides an attractive and pleasing way of mobilizing the resources of the users of internet. Since almost all users hold large storage spaces, fast network connections and powerful processors; thus, more and more users are seeking for the coordination of these resources in order to attain common goals (Chien, 2003, Pp.8-10). Due to the decentralized nature of the peer to peer networks, the integration of security has become an interesting and critical problem. The paper will focus on the significance of security in peer to peer networks. Moreover, the paper will highlight the advantages of peer to peer network in networking systems. In addition to this, the paper will focus on security issues and methods to eliminate these issues in the implementation of peer to peer networks (Chien, 2003, Pp.8-10).

Due to high demand of peer to peer networks, there is also the rising demand of security in the integration of these networks. The paper will help in identifying the issues of tryst, robustness and privacy in peer to peer networks. The systems of peer to peer networks can be improved by offering secure distributed routing, censorship resistance publishing, privacy enhancing, decentralized collaborative work spaces and shared storage. Thus, in order to take the full advantage from peer to peer networks, trust and accountability mechanisms are required to be built into a secured peer to peer networks (Chien, 2003, Pp.8-10).

Security in Peer to Peer network

Introduction

As the use of internet and information technology is increasing with the passage of time in this age of development; thus, many business organizations are shifting their operations on cloud computing and other information technologies. However, security breaches are also increasing in this age of technology and development (Hamlen & Thuraisingham, 2007, Pp.1-5). Similarly, peer to peer networks also suffer from certain security issues which must be sorted out in order to provide highly secured networking systems within the business operations. For running efficient and effective business operations, organizations are implementing the structure of peer to peer networks in their networking systems.

In the implementation of peer to peer networks, all the machines act as a server and client simultaneously. Although, there are various advantages that the conventional server client mode holds in terms of fault and efficiency tolerance, added security threats are possible to be introduced (Hamlen & Thuraisingham, 2007, Pp.1-5). IT administrators and users are required to be familiar with the hazards from the malicious code's propagation, downloaded content's legality and susceptibilities in peer to peer software. Preventive measures and security must be integrated in order to protect any kind of sensitive information's potential leakage and potential security violations. In business networks, administrators of system require to assure that the traffic of peer to peer conforms to all the corporate security policies. Moreover, they must allow the traffic from minimum set of firewall ...